freeipa/util
Rob Crittenden 46d0096218 Add a unit test for libpwquality-based password policy
- with all policies disabled passwords are not evaluated
- the pwpolicy minimum overrides the existing IPA minimum
- max character repeats
- max character sequences (12345)
- palindrome
- dictionary check
- user name in the password check

https://pagure.io/freeipa/issue/6964
https://pagure.io/freeipa/issue/5948
https://pagure.io/freeipa/issue/2445
https://pagure.io/freeipa/issue/298

Signed-off-by: Rob Crittenden <rcritten@redhat.com>
Reviewed-By: Alexander Bokovoy <abokovoy@redhat.com>
Reviewed-By: Christian Heimes <cheimes@redhat.com>
2020-10-23 09:32:52 -04:00
..
ipa_krb5.c CVE-2020-1722: prevent use of too long passwords 2020-04-14 12:36:01 +03:00
ipa_krb5.h CVE-2020-1722: prevent use of too long passwords 2020-04-14 12:36:01 +03:00
ipa_ldap.c Print LDAP diagnostic messages on error 2020-01-17 15:47:00 +01:00
ipa_ldap.h Print LDAP diagnostic messages on error 2020-01-17 15:47:00 +01:00
ipa_mspac.h Migrate from #ifndef guards to #pragma once 2016-05-29 14:04:45 +02:00
ipa_pwd_ntlm.c covscan: free ucs2-encoded password copy when generating NTLM hash 2019-11-29 11:14:18 +01:00
ipa_pwd.c Extend password policy to evaluate passwords using libpwpolicy 2020-10-23 09:32:52 -04:00
ipa_pwd.h Extend password policy to evaluate passwords using libpwpolicy 2020-10-23 09:32:52 -04:00
Makefile.am Require libpwolicy and configure it in the build system 2020-10-23 09:32:52 -04:00
t_policy.c Add a unit test for libpwquality-based password policy 2020-10-23 09:32:52 -04:00
t_pwd.c util: add unit test for pw hashing 2020-06-08 12:54:19 +03:00